咨询与建议

限定检索结果

文献类型

  • 2,110 篇 期刊文献
  • 2,010 篇 会议
  • 10 册 图书

馆藏范围

  • 4,130 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,994 篇 工学
    • 1,765 篇 计算机科学与技术...
    • 1,447 篇 软件工程
    • 515 篇 信息与通信工程
    • 318 篇 土木工程
    • 307 篇 控制科学与工程
    • 275 篇 电气工程
    • 236 篇 电子科学与技术(可...
    • 235 篇 材料科学与工程(可...
    • 219 篇 机械工程
    • 217 篇 生物工程
    • 215 篇 建筑学
    • 215 篇 化学工程与技术
    • 151 篇 交通运输工程
    • 131 篇 动力工程及工程热...
    • 128 篇 安全科学与工程
    • 126 篇 网络空间安全
    • 122 篇 力学(可授工学、理...
    • 113 篇 光学工程
    • 105 篇 仪器科学与技术
    • 90 篇 生物医学工程(可授...
  • 1,442 篇 理学
    • 749 篇 数学
    • 405 篇 物理学
    • 241 篇 生物学
    • 206 篇 统计学(可授理学、...
    • 173 篇 化学
    • 150 篇 系统科学
    • 121 篇 地球物理学
  • 619 篇 管理学
    • 410 篇 管理科学与工程(可...
    • 233 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 106 篇 法学
  • 77 篇 医学
  • 41 篇 军事学
  • 36 篇 经济学
  • 32 篇 农学
  • 23 篇 教育学
  • 13 篇 艺术学
  • 11 篇 文学

主题

  • 73 篇 semantics
  • 70 篇 cryptography
  • 67 篇 feature extracti...
  • 65 篇 authentication
  • 65 篇 training
  • 60 篇 deep learning
  • 59 篇 security
  • 56 篇 privacy
  • 52 篇 laboratories
  • 48 篇 computational mo...
  • 48 篇 information secu...
  • 48 篇 protocols
  • 43 篇 data mining
  • 41 篇 machine learning
  • 40 篇 software
  • 40 篇 cloud computing
  • 37 篇 optimization
  • 37 篇 accuracy
  • 36 篇 blockchain
  • 33 篇 computer science

机构

  • 226 篇 state key labora...
  • 161 篇 school of cyber ...
  • 152 篇 key laboratory o...
  • 105 篇 university of ch...
  • 92 篇 institute of inf...
  • 90 篇 key laboratory o...
  • 86 篇 state key labora...
  • 78 篇 department of co...
  • 78 篇 state key labora...
  • 76 篇 school of softwa...
  • 76 篇 information secu...
  • 71 篇 school of comput...
  • 65 篇 national key lab...
  • 62 篇 state key labora...
  • 56 篇 beijing key labo...
  • 55 篇 state key labora...
  • 55 篇 state key labora...
  • 52 篇 tsinghua nationa...
  • 44 篇 school of electr...
  • 39 篇 the key laborato...

作者

  • 79 篇 du xiuli
  • 57 篇 junping du
  • 38 篇 yixian yang
  • 33 篇 xiuli du
  • 31 篇 yingmin jia
  • 30 篇 cao xiaochun
  • 24 篇 wang wei
  • 24 篇 limin sun
  • 23 篇 zhao mi
  • 22 篇 wang bin
  • 21 篇 huang qingming
  • 20 篇 yang yixian
  • 20 篇 du xiu-li
  • 19 篇 guo li
  • 18 篇 du junping
  • 18 篇 li bo
  • 18 篇 yuehui jin
  • 17 篇 zhang lei
  • 17 篇 xu chengshun
  • 17 篇 tan yang

语言

  • 3,721 篇 英文
  • 209 篇 中文
  • 201 篇 其他
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Beijing Key Laboratory of Software Security Engineering Technology"
4130 条 记 录,以下是3841-3850 订阅
排序:
A model for real-time simulation of large-scale networks based on network processor
A model for real-time simulation of large-scale networks bas...
收藏 引用
2009 2nd IEEE International Conference on Broadband Network and Multimedia technology, IEEE IC-BNMT2009
作者: Xiaobo, Xu Kangfeng, Zheng Yixian, Yang Guoai, Xu Key Laboratory of Network and Information Attack and Defense Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing 100876 China
Real-time network simulation refers to simulating computer networks in real time so that the virtual network can interact with real implementations of network protocols, network services, and distributed applications.... 详细信息
来源: 评论
Bench4Q: A QoS-oriented e-commerce benchmark for internetwares  09
Bench4Q: A QoS-oriented e-commerce benchmark for internetwar...
收藏 引用
1st Asia-Pacific Symposium on Internetware, Internetware 2009
作者: Wen-Bo, Zhang Wei, Wang Zhi-Quan, Duan Technology Center of Software Engineering Institute of Software Chinese Academy of Sciences Beijing 100190 China State Key Laboratory Computer Science Institute of Software Chinese Academy of Sciences Beijing 100190 China Graduate School Chinese Academy of Sciences Beijing 100039 China
Internetwares [1] are a new type of software oriented to Internet. How to guarantee the QoS (Quality of Service) of Internetwares in highly open Internet is a challenge problem. This problem is especially important fo... 详细信息
来源: 评论
Towards a Source-Code Oriented Attestation
收藏 引用
China Communications 2009年 第4期6卷 82-87页
作者: Ruan Anbang Shen Qingni Wang Li Qin Chao Gu Liang Chen Zhong School of Software and Microelectronics Peking University Beijing 102600 China Network and Information Security Laboratory Institute of Software School of Electronics Engineering and Computer Science Peking University Beijing 100871 China Key Laboratory of High Confidence Software Technologies of the Ministry of Education Peking University Beijing 100871 China First Research Institute of Ministry of Public Security of China Beijing 100048 China
The Binary-based attestation (BA) mechanism presented by the Trusted Computing Group can equip the application with the capability of genuinely identifying configurations of remote system. However, BA only supports ... 详细信息
来源: 评论
Enriched gabor feature based PCA for face recognition with one training image per person
Enriched gabor feature based PCA for face recognition with o...
收藏 引用
5th International Conference on Natural Computation, ICNC 2009
作者: Lu, Wei Sun, Wei Lu, Hongtao School of Information Science and Technology Guangdong Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou 510275 China School of Software Guangdong Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou 510275 China Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China
Gabor feature based classification approaches are widely used in face recognition, because they are insensitive to changes in illumination and facial expression. However, most of strategies only use the magnitude of t... 详细信息
来源: 评论
L-UCON: Towards layered access control with UCON
L-UCON: Towards layered access control with UCON
收藏 引用
7th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2009
作者: Hu, Hao Li, Hao Feng, Dengguo Dept. of Electronic Engineering and Information Science University of Science and Technology of China Hefei 230027 China State Key Lab. of Information Security Institute of Software Chinese Academy of Sciences Beijing 100190 China National Engineering Research Center for Information Security Beijing 100190 China
Traditional access control solutions suffer from difficulties in access rights authorization and usage policy enforcement, especially in highly distributed environments. The layered nature of common digital content sh... 详细信息
来源: 评论
Region of interest automatic extraction for color image based on mathematical morphology
Region of interest automatic extraction for color image base...
收藏 引用
IEEE 9th International Conference on Computer and Information technology, CIT 2009
作者: Zhang, Xiao-Hong Zhu, Yuan-Yuan Fan, Zhong-Kui School of Information Engineering Jiangxi University of Science and Technology Ganzhou China Information Security Center State Key Laboratory of Networking and Switching Beijing University Posts and Telecommunication Beijing 100876 China
Combined with human visual characteristics and morphological watershed algorithm, a novel image processing method was proposed for automatic region of interest (ROI) extraction. The color image would be converted into... 详细信息
来源: 评论
Extracting real-life log with data perspective in PLM system for business process analysis
Extracting real-life log with data perspective in PLM system...
收藏 引用
2009 WRI World Congress on Computer Science and Information engineering, CSIE 2009
作者: Wang, Zhaoxia Wang, Jianmin Wen, Lijie Liu, Yingbo Department of Computer Science Tsinghua University Beijing China School of Software Tsinghua University Beijing China Key Laboratory for Information System Security Ministry of Education Logistical Engineering University Chongqing China Department of Logistical Information Engineering Logistical Engineering University Chongqing China
Event log is the important starting point of any process analysis technique. Existent business process analysis techniques are applied mainly to manual or simulated logs, considering mainly information about control p... 详细信息
来源: 评论
Dynamic dictionary design for SIP signaling compression
Dynamic dictionary design for SIP signaling compression
收藏 引用
2009 WRI World Congress on Computer Science and Information engineering, CSIE 2009
作者: Weihai, Li Yan, Ma Qing, Ma Xiaohong, Huang State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications 100876 Beijing China Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia Beijing University of Posts and Telecommunications 100876 Beijing China Network Technology Research Institute Beijing University of Posts and Telecommunications 100876 Beijing China School of Electronic Engineering Beijing University of Posts and Telecommunications 100876 Beijing China
A new SIP signaling compression solution based on structured dynamic dictionary is proposed in this paper. A SIP compression mechanism based on dynamic-dictionary is designed for improving SIP signaling compression co... 详细信息
来源: 评论
Democratic Group Signatures with Threshold Traceability
收藏 引用
Journal of Shanghai Jiaotong university(Science) 2009年 第1期14卷 98-101页
作者: 李祥学 钱海峰 李建华 School of Information Security Engineering Shanghai Jiaotong UniversityShanghai 200240China State Key Lab of Information Security Graduate School of Chinese Academy of SciencesBeijing 100039China State Key Laboratory of Integrated Service Networks Xidian UniversityXi'an 710071China Computer Science and Technology Department East China Normal UniversityShanghai 200241China
This paper presents a concrete democratic group signature scheme which holds (t, n)-threshold traceability. In the scheme, the capability of tracing the actual signer is distributed among n group members. It gives a... 详细信息
来源: 评论
Vulnerability testinh of WAP based on extended syntax analysis
Vulnerability testinh of WAP based on extended syntax analys...
收藏 引用
2009 2nd IEEE International Conference on Broadband Network and Multimedia technology, IEEE IC-BNMT2009
作者: Weihai, Li Yan, Ma Xiaohong, Huang Research Institute of Networking Technology Beijing University of Posts and Telecommunications Beijing China Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia Beijing University of Posts and Telecommunications Beijing China School of Electronic Engineering Beijing University of Posts and Telecommunications Beijing China
An extend vulnerability testing method for communication protocol is brought forward first, which is combined protocol Syntax analysis with Petri Net system. Then vulnerability testing of implementation of WAP protoco... 详细信息
来源: 评论